Treadstone 71 Training - 2018 Courses

The Treadstone 71 training courses follow intelligence tradecraft following standard intelligence community lifecycle including collection methods, techniques, planning, PIRs, and collection tools and targeting with a focus on intelligence analysis. Intelligence production methods and process flows are covered as well as evidence credibility, reliability, denial and deception, and confidence levels. Students are required to demonstrate understanding and use structured analytic techniques as well as various types of analysis including synthesis and fusion of data and information into actionable intelligence. The class covers methods of adapting TTPs and IoCs for hunt and detect and interfaces to incident response.

Treadstone 71 courses are the source of many Cyber and Cyber Threat Intelligence courses. By that, we mean many of the ideas, course flow and sometimes, even material came from the Treadstone 71 created courses at Utica College. The SANS course is no different. At least 1 student from Utica College used Treadstone 71 material from courses there to help create the SANS course. The major difference is that the source's background is purely cyber command driven at a technical level focused on see, detect, and arrest methods of after-the-fact security. In addition, the SANS course does not prepare the student beyond Security Operations, Incident Response, and Forensics. The Treadstone 71 courses are rooted in Intelligence Community Tradecraft as validated by current and former members of the IC. Treadstone 71 instruction incorporates the technical with the tactical, operational, and strategic intelligence functions and methods need to not only build an effective program, but execute to stakeholder demands beyond hunt and detect. Treadstone 71 sees hunt and detect as a requirement for organizations but only a piece of the puzzle needed for establishing the solid foundation need for an efficient cyber and threat intelligence program.

Courses from Treadstone 71 provide foundational concepts and processes in the discipline of cyber counterintelligence with a focus on cyber counterintelligence missions, defensive counterintelligence, offensive counterintelligence, and counterespionage as these realms apply to traditional tradecraft, and how they are or will evolve into the cyber domain. By starting with traditional counterintelligence and progressing to cyber counterintelligence, the student will develop an appreciation for collection efforts, exploitation of potential threats, insider concerns, and the risks and benefits of counterintelligence. The Treadstone 71 courses provide foundational support to business intelligence, competitive intelligence, and behavior analysis functions.

Organizations use our training materials to build cyber operations and intelligence collection capabilities. The cyber threat intelligence training is unique following CIA tradecraft as created by Sherman Kent and Richards Heuer. From the initial cyber intelligence tradecraft course through to clandestine cyber HUMINT, the Treadstone 71 threat intelligence training is an apprenticeship to building a reliable, sustainable, and resilient intelligence and intelligence analysis, analytic writing and dissemination program that delivers what stakeholders require.

Courses educate students on how to install and use, Tor, Tails, Maltego, Oryon, and I2P non-inclusively. Students will learn how to install and use these tools from flash drives meant to assist in anonymous methods.

Courses follow the International Association for Intelligence Education Standards for Intelligence Analyst Initial Training. We are not a diploma mill aka SANs, Sans Institute. Each course is carefully crafted and updated periodically based upon standards, environmental changes, student input, and actual execution. Organizations come to Treadstone 71 for corporate intelligence, business intelligence, and competitive intelligence needs as well of course, threat intelligence. Since 2004, Treadstone 71 has practiced intelligence tradecraft in adversary sites. We share that experience including how not to make the same mistakes we learned from with each class.

Courses include case studies covering adversary campaign research and analysis, historical trending, and passive adversary collection. Students will be instructed in applying analytic techniques, when and how to use analytic techniques and analytic types. Students are presented several case studies for analysis, required to use tradecraft methods, and provide written reports in standard analytic format will dissemination the reports to stakeholders.

More courses to come include 2-day courses in Critical Thinking, Structured Analytic Techniques, Analytic Writing and Dissemination. We offer courses in Palo Alto, Chantilly, Denver, Amsterdam, and London as well as at your organizational offices as required.

Course customization and new course development is only an email or phone call away. Come to train with Treadstone 71. Cyber Intelligence,

More courses to come include 2-day courses in Critical Thinking, Structured Analytic Techniques, Analytic Writing and Dissemination. We offer courses in Palo Alto, Chantilly, Denver, Amsterdam, and London as well as at your organizational offices as required. Course customization and new course development is only an email or phone call away. Come to train with Treadstone 71. Cyber Intelligence,

Come to train with Treadstone 71. Cyber Intelligence, Counterintelligence, and Adversary infiltration since 2004. This email address is being protected from spambots. You need JavaScript enabled to view it. 888.714.0071 Treadstone 71 - Training - Cyber Intelligence, Cyber Threat Intelligence Strategic Planning and Program Build, Research and Reporting, Interim CISO and Head of Cyber Intel Functions, Counter Intelligence, Social Networking Collection and Exploitation.

This email address is being protected from spambots. You need JavaScript enabled to view it.

Search Our Site

The Cyber Intelligence Training adds rapid returns to both Cyber Intel Analysts, and Security Ops Centers. Each student receives quality instruction and hands-on experience with today’s OSINT tools and intelligence tradecraft. This is necessary for anyone new to Cyber Intelligence and complimentary to any Security Operations within your enterprise. This 4.5-day class provides the student with the resources and fundamentals needed to establish cyber intelligence as a force as both a proactive offensive step and a counter intelligence-contributing arm of your larger team. – Antonio

"Fantastic class that gets to the foundational aspects of traditional tradecraft. We studied hard examining recent attack campaigns. The analysis training prepared me for real-world efforts. Have to say this is one of the best classes I have ever taken having taken many from SANS. SANS does not compare. They are more of a class mill today. The Treadstone 71 course material is unique, focused, and timely."

“This is one of the best, if not the best, Cyber Threat Intelligence training course I've attended.”

Ironically, said Bardin, it was Stuxnet that led Iran to enhance its offensive capability: ‘If Stuxnet had happened to the US or UK, it would have been seen as an act of war. In Iran, it made them invest heavily in offensive cyber operations.’

He revealed that 18 percent of Iranian university students are studying computer science – a cyber warfare talent pool.